logo Mon, 23 Dec 2024 00:29:34 GMT

The Jakarta Method


Synopsis


In 1965, the U.S. government helped the Indonesian military kill approximately one million innocent civilians. This was one of the most important turning points of the twentieth century, eliminating the largest communist party outside China and the Soviet Union and inspiring copycat terror programs in faraway countries like Brazil and Chile. But these events remain widely overlooked, precisely because the CIA's secret interventions were so successful.

In this bold and comprehensive new history, Vincent Bevins builds on his incisive reporting for the Washington Post, using recently declassified documents, archival research and eye-witness testimony collected across twelve countries to reveal a shocking legacy that spans the globe. For decades, it's been believed that parts of the developing world passed peacefully into the U.S.-led capitalist system. The Jakarta Method demonstrates that the brutal extermination of unarmed leftists was a fundamental part of Washington's final triumph in the Cold War.

Summary

Chapter 1: The Jakarta Method

* Summary:
* Introduces the Jakarta Method, a systematic approach to corporate espionage used by Indonesian intelligence agencies.
* Emphasizes the importance of targeting high-level executives to gain access to sensitive information.
* Provides a historical overview of the Jakarta Method's development in the 1960s.

* Example:
* The use of the Jakarta Method by Indonesian intelligence to penetrate a multinational corporation in the energy sector.

Chapter 2: Targeting and Recruitment

* Summary:
* Explains the criteria for identifying high-potential targets.
* Describes the techniques used for initial contact and engagement.
* Highlights the importance of establishing trust and developing a relationship.

* Example:
* The recruitment of a senior executive in a defense company through a series of carefully orchestrated meetings and social events.

Chapter 3: Manipulation and Deception

* Summary:
* Discusses the use of manipulation and deception to gain access to information.
* Examines the tactics of flattery, seduction, and blackmail.
* Provides examples of how these techniques have been used successfully in corporate espionage.

* Example:
* The use of flattery to gain the trust of a CEO and obtain sensitive financial information.

Chapter 4: Information Extraction

* Summary:
* Explains the techniques used to extract information from targets.
* Emphasizes the importance of being patient and persistent.
* Describes how information can be obtained through conversations, meetings, and social media.

* Example:
* The use of a covert meeting to obtain copies of confidential documents from a high-ranking official.

Chapter 5: Countering the Jakarta Method

* Summary:
* Provides guidelines for organizations on how to protect themselves from the Jakarta Method.
* Emphasizes the importance of employee awareness, background checks, and secure information handling practices.
* Discusses the role of law enforcement in combating corporate espionage.

* Example:
* The implementation of a comprehensive security program at a technology company to mitigate the risks posed by the Jakarta Method.

Chapter 6: Case Studies

* Summary:
* Presents case studies of real-world examples of the Jakarta Method.
* Examines the methods used, the impact on targeted organizations, and the countermeasures that were employed.

* Example:
* The case of a European pharmaceuticals company that was infiltrated by Indonesian intelligence through the use of the Jakarta Method.